Method of Analyzing Data

63 CHAPTER IV FINDING AND DISCUSSION This chapter presents finding and discussion. The writer will present the data that were obtained from the transcription of the utterance of the host of talk Indonesia in interviewing his guests. The data analysis of this chapter is conducted to serve the research problems in chapter I then the data are analyzed based on the theories in chapter II.

4.1. Finding

This chapter presents the findings which were discussed based on the politeness theory by Brown and Levinson 1987. The data were obtained from three episodes of “Talk Indonesia” on Metro TV. The data are the utterances of the host and guests of Talk Indonesia. After conducting the analysis, the writer found face threatening acts occurred in the conversation between the host and his guests. The face threatening acts found were face threatening acts that threatened both hearers’ and speakers’ negative and positive face. The face threatening acts which th reatened the hearers’ face was delivered by the host. While face threatening acts that threatened the speakers’ face was delivered by the host and the guests. 64 To maintain the effect of the face threatening, however; face saving acts were also employed. Positive politeness can be used to save the positive face. While negative politeness can be used to satisfy negative face. Some sociological variables also gave influence to the realization of the politeness strategies. The influence of relative power can be seen in the use of higher politeness strategies when the host spoke to his guest who had higher relative power than him. The influence of social distance can be seen in the use of high politeness strategies to the guests who had high social distance to him. The last was the influence of rank of imposition to the use of politeness strategies. When the rank of imposition was high, the host employed high politeness strategies to lessen the effect of the face threatening acts.

4.1.1 Kinds of Face Threatening Acts

The first step that the writer conducted in this analysis was identifying the face threatening acts which occurred in the conversation. The face threatening acts was divided into 2 categories, the first is the acts that threatened hearer’s face, and the second was the acts that threatened speaker’s face. Each category threatened both positive and negative face. After analyzing the data, the writer found some acts which threatened both hearer and speaker’s positive and negative face. Those acts are as follows: 65 1. Acts that threatened addressee’s negative face: giving compliments, asking for personal information, giving suggestion or advice. 2. Acts that threatened addressee’s positive face: using address terms and other status marked identifications in initial encounter, expressing disagreement, interrupting talk, expression of criticism, talking about taboo topics, and raising emotional or divisive topics, 3. Acts that threatened speaker’s negative face: giving excuses, unwilling promise and offer. 4. Acts that threatened speaker’s positive face: confession or admission of guilt or responsibility, self humiliation, acceptance of a compliment. The examples of those acts are described as follows: 4.1.1.1 Acts that Threaten Addressee’s Negative Face Acts that threaten addressee’s negative face are acts that primarily threaten the addressees’ or hearers’ negative face want by indicating that the speaker did not intend to avoid impeding H ’s freedom of action. Those acts that found in this analysis were giving compliments, asking for personal information, giving suggestion or advice. Example 1 They talked about their favorite book. The host asked C to tell him about the last good book she had read H : Ok, C, last good book. C50.